Reed Elsevier

Displaying 1-40 of 952 results

  • White Papers // May 2012

    An Energy-Centric Handover Decision Algorithm for the Integrated LTE Macrocell - Femtocell Network

    Femtocells are attracting a fast increasing interest now-a-days, as a promising solution to improve indoor coverage and system capacity. Due to the short transmit-receive distance, femtocells can greatly lower transmit power, prolong handset battery life, and enhance the user-perceived Quality of Service (QoS). On the other hand, technical challenges still...

    Provided By Reed Elsevier

  • White Papers // May 2012

    Reducing Virtual-to-Physical Address Translation Overhead in Distributed Shared Memory Based Multi-Core Network-on-Chips According to Data Property

    In Network-on-Chip (NoC) based multi-core platforms, Distributed Shared Memory (DSM) preferably uses virtual addressing in order to hide the physical locations of the memories. However, this incurs performance penalty due to the Virtual-To-Physical (V2P) address translation overhead for all memory accesses. Based on the data property which can be either...

    Provided By Reed Elsevier

  • White Papers // Apr 2012

    Node Localization Through Physical Layer Network Coding: Bootstrap, Security, and Accuracy

    Previous research on Physical-layer Network Coding (PNC) focuses on the improvements in bandwidth usage efficiency. Its capability to assist wireless nodes in localization was first discussed. In that paper, however, the authors discussed only the basic idea to detect and separate the interfered signals for calculating the node positions. Many...

    Provided By Reed Elsevier

  • White Papers // Apr 2012

    A Green Handover Protocol in Two-Tier OFDMA Macrocell - Femtocell Networks

    Femtocells are a promising technology to improve network performance with the short-range, low-power, and cost-beneficial small base stations. A femtocell is a low-power wireless access point that operates in licensed spectrum to connect a standard device to an operator's network using a Digital Subscriber Line (DSL) connection. Most of the...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    Secure Neighbor Discovery and Wormhole Localization in Mobile Ad Hoc Networks

    Neighbor discovery is an important part of many protocols for wireless ad hoc networks, including localization and routing. When neighbor discovery fails, communications and protocols performance deteriorate. In networks affected by relay attacks, also known as wormholes, the failure may be more subtle. The wormhole may selectively deny or degrade...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    Network Coding-Based Cooperative ARQ Scheme for VANETs

    In this paper, the authors introduce a novel network coding-based Medium Access Control (MAC) protocol for Vehicular Ad-hoc NETworks (VANETs) that use cooperative Automatic Repeat reQuest (ARQ) techniques. Their protocol coordinates the channel access among a set of relays capable of using network coding in order to minimize the number...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    Towards a Reputation-Based Routing Protocol to Contrast Blackholes in a Delay Tolerant Network

    A Delay Tolerant Network (DTN) relies on the implicit assumption that nodes cooperate towards message forwarding. However, this assumption cannot be satisfied when there are malicious nodes acting as blackholes and voluntarily attracting and dropping messages. In this paper, the authors propose a reputation-based protocol for contrasting blackholes. Every node...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    Methodology for Public Administrators for Selecting Between Open Source and Proprietary Software

    The public sector needs to change over to communicating digitally. This development makes great demands both on work processes in the public sector and on the Information Technology systems, on which e-government is based. From the economic perspective, the change-over poses great challenges, as huge investments will have to be...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    A Bandwidth and Effective Hit Optimal Cache Scheme for Wireless Data Access Networks With Client Injected Updates

    In this paper, the authors propose an optimal cache replacement policy for data access applications in wireless networks where data updates are injected from all the clients. The goal of the policy is to increase effective hits in the client caches and in turn, make efficient use of the network...

    Provided By Reed Elsevier

  • White Papers // Feb 2012

    Towards Mobile Intelligence: Learning From GPS History Data for Collaborative Recommendation

    With the increasing popularity of location-based services, the authors have accumulated a lot of location data on the Web. In this paper, the authors are interested in answering two popular location-related queries in their daily life: if the people want to do something such as sightseeing or dining in a...

    Provided By Reed Elsevier

  • White Papers // Feb 2012

    A Simulation Modelling Tool for Distributed Virtual Environments

    Distributed Virtual Environments simulate the behavior and activities of a great number of users interacting in a virtual world over a wide area network. The size of the virtual worlds and the tremendous number of users that these environments are called to support require additional bandwidth and computational resources. For...

    Provided By Reed Elsevier

  • White Papers // Feb 2012

    Sleep-Based Topology Control in the Ad Hoc Networks by Using Fitness Aware Learning Automata

    Learning automata have been found to be useful in the systems with incomplete knowledge. Therefore, it can be used as a tool to solve problems of Ad Hoc networks, where nodes are mobile and operate within a dynamic environment, which entails possibly unknown and time varying characteristics. In this paper,...

    Provided By Reed Elsevier

  • White Papers // Jan 2012

    Team Formation and Steering Algorithms for Underwater Gliders Using Acoustic Communications

    In order to take measurements in space and time from the under-sampled vast ocean, it is necessary to employ multiple autonomous underwater vehicles, such as gliders, that communicate and coordinate with each other. These vehicles need to form a team in a specific formation, steer through the 3D region of...

    Provided By Reed Elsevier

  • White Papers // Jan 2012

    Referential Integrity Quality Metrics

    Referential integrity is an essential global constraint in a relational database, that maintains it in a complete and consistent state. In this paper, the authors assume the database may violate referential integrity and relations may be de-normalized. They propose a set of quality metrics, defined at four granularity levels: database,...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    A Historical Probability Based Noise Generation Strategy for Privacy Protection in Cloud Computing

    Cloud computing promises an open environment where customers can deploy IT services in pay-as-you-go fashion while saving huge capital investment in their own IT infrastructure. Due to the openness, various malicious service providers can exist. Such service providers may record service requests from a customer and then collectively deduce the...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    ActiSen: Activity-Aware Sensor Network in Smart Environments

    A sensor network, unlike a traditional communication network, provides high degree of visibility into environmental physical processes. Therefore, its operation is driven by the activities in the environment. In long-term operations, these activities usually show certain patterns which can be learned and utilized to optimize network design. However, this has...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    Efficient Audit Service Outsourcing for Data Integrity in Clouds

    Cloud-based outsourced storage relieves the client's burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. However, the fact that clients no longer have physical possession of data indicates that they are facing a potentially formidable risk for missing or corrupted data. To avoid the security...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    Practical and Secure Localization and Key Distribution for Wireless Sensor Networks

    In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with legitimate in-network communication. In this paper, the authors introduce Secure Walking GPS, a practical and cost effective secure localization and key distribution solution for...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    A Structural Approach for PoP Geo-Location

    Inferring PoP level maps is gaining interest due to its importance to many areas, e.g., for tracking the Internet evolution and studying its properties. In this paper, the authors introduce a novel structural approach to automatically generate large scale PoP level maps using trace-route measurement from multiple locations. The PoPs...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    Talent Scouting in P2P Networks

    Record labels would like to identify potential artists as early as possible in their career, before other companies approach the artists with competing contracts. However, there are a huge number of new artists, and the process of identifying the ones with high success potential is labor intensive. This paper demonstrates...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    Low-Dimensional Signal-Strength Fingerprint-Based Positioning in Wireless LANs

    Accurate location awareness is of paramount importance in most ubiquitous and pervasive computing applications. Numerous solutions for indoor localization based on IEEE802.11, Bluetooth, ultrasonic and vision technologies have been proposed. This paper introduces a suite of novel indoor positioning techniques utilizing Signal-Strength (SS) fingerprints collected from Access Points (APs). The...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    ORACLE: Mobility Control in Wireless Sensor and Actor Networks

    Mobile actor is a promising tool for Wireless Sensor and Actor Networks (WSANs) provisioning energy and time efficient data collection. In this paper, the authors study actors' mobility control in WSANs for efficient events detecting in terms of time and energy consumption. They introduce an innovative approach ORACLE, to make...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    A Pure Embedding of Attribute Grammars

    Attribute grammars are a powerful specification paradigm for many language processing tasks, particularly semantic analysis of programming languages. Recent attribute grammar systems use dynamic scheduling algorithms to evaluate attributes on demand. In this paper, the authors show how to remove the need for a generator, by embedding a dynamic approach...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    A Trust Negotiation Based Security Framework for Service Provisioning in Load-Balancing Clusters

    The OKKAM project aims at enabling the Web of Entities, a global digital space for publishing and managing information about entities. The project provides a scalable and sustainable infrastructure, called the Entity Name System (ENS), for the systematic reuse of global and unique entity identifiers. The ENS provides a collection...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    On Scrambling the Burrowse-Wheeler Transform to Provide Privacy in Lossless Compression

    The usual way of ensuring the confidentiality of the compressed data is to encrypt it with a standard encryption algorithm. Although the computational cost of encryption is practically tolerable in most cases, the lack of flexibility to perform pattern matching on the compressed data due to the encryption level is...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    A Semantically Enhanced Service Repository for User-Centric Service Discovery and Management

    User centricity represents a new trend in the currently flourishing service oriented computing era. By upgrading end-users to prosumers (producer+consumer) and involving them in the process of service creation, both service consumers and service providers can benefit from a cheaper, faster, and better service provisioning. The EU-IST research project OPUCE...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    A Robust Hashing Algorithm Based on SURF for Video Copy Detection

    To protect digital video from unauthorized use, video copy detection is an active research topic in the field of copyright control. For content-based copy detection, the key issue is to extract robust transformation-invariant feature. In this paper, a robust hashing algorithm based on Speeded Up Robust Feature (SURF) and Ordinal...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    QoS and Preemption Aware Scheduling in Federated and Virtualized Grid Computing Environments

    Resource provisioning is one of the challenges in federated Grid environments. In these environments each Grid serves requests from external users along with local users. Recently, this resource provisioning is performed in the form of Virtual Machines (VMs). The problem arises when there are insufficient resources for local users to...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    Tracing and Revoking Scheme for Dynamic Privileges Against Pirate Rebroadcast

    Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel so that only the qualified users can recover the data. Currently, there are only two broadcast encryption schemes designed for users with different privileges. In these schemes, users with higher privileges can decrypt...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    100GbE and Beyond for Warehouse Scale Computing Interconnects

    Increasing broadband penetration in the last few years has resulted in a dramatic growth in innovative, bandwidth-intensive applications that have been embraced by the consumers. Coupled with this consumer trend is the migration from local compute/storage model to a cloud computing paradigm. As computation and storage continues to move from...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    Long-Term Availability Prediction for Groups of Volunteer Resources

    Volunteer computing uses the free resources in Internet and Intranet environments for large-scale computation and storage. Currently, 70 applications use over 12 Peta-FLOPS of computing power from such platforms. However, these platforms are currently limited to embarrassingly parallel applications. In an effort to broaden the set of applications that can...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    Looking Ahead in Pervasive Computing: Challenges and Opportunities in the Era of Cyber - Physical Convergence

    The physical environment is becoming more and more saturated with computing and communication entities that interact among themselves, as well as with users: virtually everything will be enabled to source information and respond to appropriate stimuli. In this technology-rich scenario, real-world components interact with cyberspace via sensing, computing and communication...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    Biconnecting a Network of Mobile Robots Using Virtual Angular Forces

    This paper addresses the problem of self-deploying a swarm of wireless mobile robots in a biconnected fashion. The motivations for deploying robotic sensor networks in general include accessing places where human cannot go (e.g. remote planets, underwater area, dangerous spots with chemical or radioactive leaks), or automating fastidious large scale...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    Compressive Sampling Based Differential Detection for UWB Impulse Radio Signals

    Non-coherent detectors significantly contribute to the practical realization of the UltraWide-Band (UWB) Impulse-Radio (IR) concept, in that they allow avoiding channel estimation and provide highly efficient reception capabilities. Complexity can be reduced even further by resorting to an all-digital implementation, but Nyquist-rate sampling of the received signal is still required....

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    TDMA Scheduling for Event-Triggered Data Aggregation in Irregular Wireless Sensor Networks

    Multi-hop wireless sensor networks often use a TDMA schedule to collect data periodically from multiple locations within a large area. If the measurements from neighboring sensors are cross-correlated, they can be aggregated and compressed as they travel to the data sink. In order for data aggregation to occur quickly, the...

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    Content Delivery and Caching From a Network Provider's Perspective

    An ongoing challenge in telecommunication is to integrate a variety of services on broadband access platforms at increasing transmission speed. Traditional Internet services, such as file transfer, email and web browsing, are now running on common multi-service IP platforms together with voice, video and television over IP, online gaming, P2P...

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    Session Level Flow Classification by Packet Size Distribution and Session Grouping

    Classifying traffic into specific network applications is essential for application-aware network management and it becomes more challenging because modern applications complicate their network behaviors. While port number-based classifiers work only for some well-known applications and signature-based classifiers are not applicable to encrypted packet payloads, researchers tend to classify network traffic...

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    Research Challenges Towards the Future Internet

    The convergence of computer-communication networks towards an all-IP integrated network has transformed Internet in a commercial commodity that has stimulated an un-precedent offer of novel communication services that are pushing the Internet architecture and protocols well beyond their original design. This calls for extraordinary research efforts at all levels of...

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    A New Adaptive Receiver-Initiated Scheme for Mitigating Starvation in Wireless Networks

    Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters are within the range of each other. Unfortunately, in multi-hop topologies, the asymmetric view of the channel state leads to a throughput distribution where a few flows...

    Provided By Reed Elsevier

  • White Papers // Aug 2011

    TCP Slow Start With Fair Share of Bandwidth

    The initial start-up performance of TCP largely depends on two parameters - ssthresh and cwnd. When these values are not accurate, TCP cannot utilize the bandwidth fully or may generate multiple packet drops. Unfortunately, estimating these parameters is not easy since little network state information is available for the TCP...

    Provided By Reed Elsevier

  • White Papers // Dec 2010

    Aggregated Mobility-Based Topology Inference for Fast Sensor Data Collection

    The authors investigate the problem of efficient data collection in wireless sensor networks where both the sensors and the sink move. They especially study the important, realistic case where the spatial distribution of sensors is non-uniform and their mobility is diverse and dynamic. The basic idea of their protocol is...

    Provided By Reed Elsevier

  • White Papers // Aug 2010

    Network Virtualization Substrate With Parallelized Data Plane

    Network virtualization provides the ability to run multiple concurrent virtual networks over a shared substrate. However, it is challenging to design such a platform to host multiple heterogenous and often highly customized virtual networks. Not only high degree of flexibility is desired for virtual networks to customize their functions, fast...

    Provided By Reed Elsevier

  • White Papers // Dec 2010

    Enhancing Multi-Hop Communication Over Multi-Radio Multi-Channel Wireless Mesh Networks: A Cross-Layer Approach

    The multi-channel multi-radio technology represents a straightforward approach to expand the capacity of Wireless Mesh Networks (WMNs) in broadband wireless access scenarios. However, the effective leveraging of this technology in WMNs requires enhanced MAC protocols, to coordinate the access to multiple channels with a limited number of radio interfaces, and...

    Provided By Reed Elsevier

  • White Papers // Jul 2010

    Separating Computation and Storage With Storage Virtualization

    Recent advances of hardware, software, and networks have made the management and security issues increasingly challenging in PC usage. Due to the tight coupling of hardware and software, each one of the hundreds or thousands of PCs connected in a networked environment has to be managed and administrated individually, leading...

    Provided By Reed Elsevier

  • White Papers // Mar 2010

    Connectivity Preserving Localized Coverage Algorithm for Area Monitoring Using Wireless Sensor Networks

    Efficient network coverage and connectivity are the requisites for most Wireless Sensor Network (WSN) deployments, particularly those concerned with area monitoring. Due to the resource constraints of the sensor nodes, redundancy of coverage area must be reduced for effective utilization of the available resources. If two nodes have the same...

    Provided By Reed Elsevier

  • White Papers // May 2010

    Design, Optimization and Performance Evaluation of a Content Distribution Overlay for Streaming

    As an evolution of peer-to-peer (p2p) file-sharing applications, overlay-based networks are also adopted to efficiently distribute content with real-time constraints to a wide user population. In addition, they can be utilized to exploit application level strategies to overcome limitations imposed by the underlying network infrastructure, e.g., the lack of multicast...

    Provided By Reed Elsevier

  • White Papers // Feb 2011

    Dynamic Robust Power Allocation Games Under Channel Uncertainty and Time Delays

    In this paper, the authors study dynamic robust power allocation strategies under the imperfectness of the channel state information at the transmitters. Considering unknown payoff functions at the transmitters, they propose an heterogeneous Delayed COmbined fully DIstributed PAyoff and Strategy Reinforcement Learning (Delayed-CODIPAS-RL) in which each transmitter learns its payoff...

    Provided By Reed Elsevier

  • White Papers // Feb 2011

    A Weighted Cooperative Spectrum Sensing Framework for Infrastructure-Based Cognitive Radio Networks

    Spectrum sensing plays a critical role in cognitive radio networks. A good sensing scheme can reduce the false alarm probability and the miss detection probability, and thus improves spectrum utilization. This paper presents a weighted cooperative spectrum sensing framework for infrastructure-based cognitive radio networks, to increase the spectrum sensing accuracy....

    Provided By Reed Elsevier

  • White Papers // Nov 2010

    Self-Similar Cross-Traffic Analysis as a Foundation for Choosing Among Active Available Bandwidth Measurement Strategies

    Among the many active, available bandwidth estimation tools and methods that have appeared recently in the literature, none has emerged that is accurate and robust enough to function in different networking environments. One of the main reasons for this problem is the highly variable statistical nature of network traffic. The...

    Provided By Reed Elsevier

  • White Papers // Dec 2010

    Realizing and Benchmarking Broadcast Algorithms in Wireless Mesh Networks

    Broadcasting by flooding causes the broadcast storm problem in multi-hop wireless networks. This problem becomes more likely in a Wireless Mesh Network (WMN) because WMNs can bridge wired LANs, increasing broadcast traffic and collision probability. Since the network control, routing, and topology maintenance of a WMN highly rely on layer-2...

    Provided By Reed Elsevier

  • White Papers // Dec 2010

    A New Paradigm for Urban Surveillance With Vehicular Sensor Networks

    The authors consider a new application paradigm of Vehicular Sensor Networks (VSN). Currently, vehicles are equipped with forward facing cameras to assist forensic investigations of events by proactive image-capturing from streets and roads. Due to content redundancy and storage imbalance in this in-network distributed storage system, how to maximize its...

    Provided By Reed Elsevier

  • White Papers // Dec 2010

    Parallel Video Streaming Optimizing Network Throughput

    In the Internet, video streaming services, in which users can enjoy videos at home, are becoming popular. Video streaming with High Definition TV (HDTV) or Ultra High Definition Video (UHDV) quality will be also provided and widely demanded in the future. However, the transmission bit-rate of high-quality video streaming is...

    Provided By Reed Elsevier

  • White Papers // Dec 2010

    XOR-Based Frame Loss Recovery Scheme for Video Streaming

    High coding dependencies among video frames suffer from vulnerability to packet loss, which impacts the playback quality of video streaming. In this paper, according to the characteristics of MPEG4/H.264 encoding methods, the authors propose a simple and low-complexity XOR-based FEC frame loss recovery scheme. Within an entire Group Of Pictures...

    Provided By Reed Elsevier

  • White Papers // Dec 2010

    Traffic Analysis Attacks on Skype VoIP Calls

    Skype is one of the most popular Voice-over-IP (VoIP) service providers. One of the main reasons for the popularity of Skype VoIP services is its unique set of features to protect privacy of VoIP calls such as strong encryption, proprietary protocols, unknown codecs, dynamic path selection, and the constant packet...

    Provided By Reed Elsevier

  • White Papers // Dec 2010

    Modeling Multiple Hop Wireless Networks With Varying Transmission Power and Data Rate

    Wireless multi-hop networks can vary both the transmission power and modulation of links. Those two parameters provide several design choices, which influence the performance of wireless multi-hop networks, e.g., minimize energy consumption, increase throughput, reduce contention, and maximize link quality. However, only network-wide metrics are considered in previous works. Further,...

    Provided By Reed Elsevier

  • White Papers // Dec 2010

    Improving Performance for Multimedia Traffic With Distributed Dynamic QoS Adaptation

    In this paper, the authors describe and present results of using an architecture that leverages the potential of IETF's Differentiated Services giving the border of the network the necessary knowledge to better react to core conditions when impairment is foreseen for important traffic such as video streaming, using limited signalization....

    Provided By Reed Elsevier

  • White Papers // Jan 2011

    Poly: A Reliable and Energy Efficient Topology Control Protocol for Wireless Sensor Networks

    Energy efficiency and reliability are the two important requirements for mission-critical wireless sensor networks. In the context of sensor topology control for routing and dissemination, Connected Dominating Set (CDS) based techniques proposed in prior literature provide the most promising efficiency and reliability. In a CDS-based topology control technique, a backbone...

    Provided By Reed Elsevier

  • White Papers // Jan 2011

    Comparison of Efficient Random Walk Strategies for Wireless Multi-Hop Networks

    Wireless multi-hop networks have drawn great attention from research and business communities since they suit well diverse application scenarios, such as environmental monitoring, military support in hostile environments and emergency applications. However, this challenging communication paradigm requires solutions able to fit specific requirements in terms of resource constrains, node mobility...

    Provided By Reed Elsevier

  • White Papers // Feb 2010

    Radio Resource Management in Emerging Heterogeneous Wireless Networks

    Deployment of heterogeneous wireless networks is spreading throughout the world as users want to be connected anytime, anywhere, and anyhow. Meanwhile, these users are increasingly interested in multimedia applications such as video streaming and Voice over IP (VoIP), which require strict Quality of Service (QoS) support. Provisioning network resources with...

    Provided By Reed Elsevier

  • White Papers // Feb 2010

    Probabilistic Framework and Performance Evaluation for Prioritized Call Admission Control in Next Generation Networks

    Next Generation Networks (NGN) are designed to support a wide range of applications with various Service Classes (SCs) guaranteeing the respective Quality of Service (QoS) levels. Since such networks is resource constrained, Call Admission Control (CAC) is imperative to achieve the required QoS levels. In this paper, a new probabilistic...

    Provided By Reed Elsevier

  • White Papers // Sep 2009

    Design and Performance Evaluation of ContentPlace, a Social-Aware Data Dissemination System for Opportunistic Networks

    In this paper, the authors present and evaluate ContentPlace, a data dissemination system for opportunistic networks, i.e., mobile networks in which stable simultaneous multi-hop paths between communication endpoints cannot be provided. They consider a scenario in which users both produce and consume data objects. ContentPlace takes care of moving and...

    Provided By Reed Elsevier

  • White Papers // Sep 2009

    A Mobility Management Scheme for Wireless Mesh Networks Based on a Hybrid Routing Protocol

    Recent advances in Wireless Mesh Networks (WMNs) have overcome the drawbacks of traditional wired networks and wireless ad hoc networks. WMNs will play a leading role in the next generation of networks, and the question of how to provide seamless mobility management for WMNs is the driving force behind the...

    Provided By Reed Elsevier

  • White Papers // Aug 2009

    Making the Best of Limited Resources: Optimized Differential Sensing in Cognitive PANs

    Cognitive radio technology necessitates accurate and timely sensing of primary users' activity on the chosen set of channels. The simplest selection procedure is a simple random choice of channels to be sensed, but the impact of sensing errors with respect to primary user activity or inactivity differs considerably. In order...

    Provided By Reed Elsevier

  • White Papers // Feb 2010

    CCMAC: Coordinated Cooperative MAC for Wireless LANs

    In wireless LANs, throughput is one of, if not the most, important performance metric. This metric becomes more critical at the bottleneck area of the network, which is normally the area around the Access Point (AP). In this paper, the authors propose CCMAC, a coordinated cooperative MAC for wireless LANs....

    Provided By Reed Elsevier

  • White Papers // Aug 2009

    Active Time Scheduling for Rechargeable Sensor Networks

    Recent progress in energy harvesting technologies made it possible to build sensor networks with rechargeable nodes which target an indefinitely long operation. In these networks, the goal of energy management is to allocate the available energy such that the important performance metrics, such as the number of detected threats, are...

    Provided By Reed Elsevier

  • White Papers // Aug 2009

    Physically-Based Models of Low-Power Wireless Links Using Signal Power Simulation

    The authors propose deriving wireless simulation models from experimental traces of radio signal strength. Because, experimental traces have holes due to packet losses, they explore two algorithms for filling the gaps in lossy experimental traces. Using completed traces, they apply the Closest-Fit Pattern Matching (CPM) algorithm, originally designed for modeling...

    Provided By Reed Elsevier

  • White Papers // Aug 2009

    Improved Modeling of IEEE 802.11a PHY Through Fine-Grained Measurements

    In wireless networks, modeling of the physical layer behavior is an important yet difficult task. Modeling and estimating wireless interference is receiving great attention, and is crucial in a wireless network performance study. The physical layer capture, preamble detection, and carrier sense threshold are three key components that play important...

    Provided By Reed Elsevier

  • White Papers // Aug 2010

    Enabling Decentralised Management Through Federation

    Cross-domain management is an increasingly important concern in network management and such management capability is a key-enabler of many emerging computing environments. This paper analyses the requirements for management systems that aim to support flexible and general capability sharing between autonomously managed domains. It introduces a novel Layered Federation Model...

    Provided By Reed Elsevier

  • White Papers // Aug 2010

    Enabling User-Oriented Management for Ubiquitous Computing: The Meta-Design Approach

    This paper presents iPlumber, a user-oriented management system for ubiquitous computing environments. Different from previous low-benefit ''Zero-configuration" systems or high cognitive-cost ''End user programming" tools, the authors' work attempts to attain a better balance between user benefits and cost by exploring the meta-design approach. A set of typical management activities...

    Provided By Reed Elsevier

  • White Papers // Aug 2010

    Managing Networks Through Context: Graph Visualization and Exploration

    With the increasing prevalence of multi-user environments in distributed systems, it has become an increasingly challenging task to precisely identify who is doing what on an enterprise network. Current management systems that rely on inference for user identity and application are not capable of accurately reporting and managing a large-scale...

    Provided By Reed Elsevier

  • White Papers // Aug 2010

    Network Virtualization in Energy-Efficient Office Environments

    The rising costs of energy and world-wide desire to reduce CO2 emissions has led to an increased concern over the energy efficiency of information and communication technology. Whilst much of this concern has focused on data centers, office environments (and the computing equipment that they contain) have also been identified...

    Provided By Reed Elsevier

  • White Papers // Sep 2010

    A Decentralized Energy-Based Diffusion Algorithm to Increase the Lifetime of MANETs

    In this paper, the authors introduce a novel approach to improve overall lifetime in mobile ad hoc networks. Given the energy constraint on each node, this problem is formulated as an energy-controlled load balancing problem. Thus, their approach is quite different from usual energy-efficient routing or topology control methods. The...

    Provided By Reed Elsevier

  • White Papers // Sep 2010

    TRIMS, a Privacy-Aware Trust and Reputation Model for Identity Management Systems

    Electronic transactions are becoming more important everyday. Several tasks like buying goods, booking flights or hotel rooms, or paying for streaming a movie, for instance, can be carried out through the Internet. Nevertheless, they are still some drawbacks due to security threats while performing such operations. Trust and reputation management...

    Provided By Reed Elsevier

  • White Papers // Sep 2010

    Model-Driven Coordinated Management of Data Centers

    Management of computing infrastructure in data centers is an important and challenging problem that needs to: ensure availability of services conforming to the Service Level Agreements (SLAs); and reduce the Power Usage Effectiveness (PUE), i.e. the ratio of total power, up to half of which is attributed to data center...

    Provided By Reed Elsevier

  • White Papers // Oct 2009

    Optimization of Sequences in CDMA Systems: A Statistical - Mechanics Approach

    A statistical-mechanics approach is useful not only in analyzing the macroscopic system performance of wireless communication systems, but also in discussing design problems of wireless communication systems. The authors discuss a design problem of spreading sequences in Code-Division Multiple-Access (CDMA) systems, as an example demonstrating the usefulness of the statistical-mechanics...

    Provided By Reed Elsevier

  • White Papers // Jun 2010

    Building a Collaborative Peer-to-Peer Wiki System on a Structured Overlay

    The ever growing request for digital information raises the need for content distribution architectures providing high storage capacity, data availability and good performance. While many simple solutions for scalable distribution of quasi-static content exist, there are still no approaches that can ensure both scalability and consistency for the case of...

    Provided By Reed Elsevier

  • White Papers // Jun 2010

    P2pWeb: An Open, Decentralized Infrastructure of Web Servers for Sharing Ephemeral Web Content

    Nowadays, the people are witnessing an increasing growth of Web 2.0 content such as micronews, blogs and RSS feeds. This trend exemplified by applications like Twitter and LiveJournal is starting to slow down not only by the limitations of existing services - proprietary and centralized, but also by the cumbersome...

    Provided By Reed Elsevier

  • White Papers // Jun 2010

    Redesigning Multi-Channel P2P Live Video Systems With View-Upload Decoupling

    In current multi-channel P2P live video systems, there are several fundamental performance problems including exceedingly-large channel switching delays, long playback lags, and poor performance for less popular channels. These performance problems primarily stem from two intrinsic characteristics of multi-channel P2P video systems: channel churn and channel-resource imbalance. In this paper,...

    Provided By Reed Elsevier

  • White Papers // Jun 2010

    Badumna: A Decentralised Network Engine for Virtual Environments

    Many of today's virtual environment applications, such as massively multiplayer online games, involve a large and rapidly changing set of users. The server-based architecture of these applications makes its hard for them to support the dynamic user base and provide a scalable solution. Badumna, a scalable network engine for large-scale...

    Provided By Reed Elsevier

  • White Papers // Jun 2010

    Multi-Objective Optimization of Multicast Overlays for Collaborative Applications

    Current real-time collaborative application implementations use dedicated infrastructure to carry out all communication and synchronization activities. Specifically, they require all end nodes to communicate directly with and through the central server. In this paper, the authors investigate scenarios in which the most resource intensive functionality of continuous communication among collaborators...

    Provided By Reed Elsevier